Guest Editor(s)
-
- Prof. Kuo-Hui Yeh
- Department of Information Management, National Dong Hwa University, Hualien, Taiwan.
Website | E-mail
-
- Prof. Chunhua Su
- Division of Computer Science, University of Aizu, Aizu, Japan.
Website | E-mail
Special Issue Introduction
The International Conference on Information Security Practice and Experience (ISPEC) solicits papers and posters to present innovative research results, problem solutions, and new challenges in the field of information security practice and experience. The whole spectrum of IT systems and application areas, including hardware design and software systems, with stringent relevance to security and privacy concerns, are of interest to ISPEC. This year, the 17th International Conference on Information Security Practice and Experience (ISPEC 2022) will be held in Taipei, Taiwan, on November 23-25, 2022. The conference will be organized by National Dong Hwa University (NDHU), and co-organized by National Taiwan University of Science and Technology (NTUST), and National Sun Yat-sen University (NSYSU). The aim of ISPEC 2022 is to provide a leading edge forum to foster interaction between researchers and developers with the information security practice and experience communities, and to give attendees an opportunity to interact with experts in academia, industry, and governments. More information about the conference can be found at its website, i.e., https://ispec2022.ndhu.edu.tw/.
This Special Issue is to publish outstanding researches from ISPEC 2022. We plan to select the papers relevant to information security practice and experience from the accepted papers based on the reviews (comments and scores). Each selected paper must be substantially extended, with at least a 40% difference from its conference version.
Topics of interest include but are not limited to:
● Access control
● Applied cryptography
● Big data security and privacy
● Biometric Security
● Cloud security
● Cryptocurrency
● Cyber security for urban transportation
● Cyber-physical security
● Data security in cloud computing
● Database security
● Digital forensics
● Embedded systems security
● Formal methods for security
● Intrusion detection
● Key management
● Lightweight security
● Web security
● Malware detection
● Mobile security
● Network security and privacy
● Operating system security
● Privacy enhanced technology
● Secure data sharing in cloud
● Security and privacy in edge computing
● Security and privacy in IoT
● Security and privacy in ubiquitous computing
● Security for critical infrastructures
● Security issues in blockchain
● Smart grid security
● Software security
● Viruses and malware
● Trust management system for mobile computing
Submission Deadline
28 Feb 2023